What’s Happening, and When

Already Registered? The Event Environment Is Open: Login Here

The agenda features best-in-class keynotes, conversations, and workshops that prepare you for the future of information security in the coming year.

All times listed on the agenda are Eastern Standard Time.

Today’s Theme: Anticipating Threats

How Should We Prepare For Unknown Threats? Creating a Proactive Organization for Swift Response

When organizations Identify and assess existing, new, and emerging risks allows them prepare for impending or new risks, and enables them to potentially minimize or even prevent losses. On the information security battlefield, CISOs and their organizations face growing needs to better anticipate threats. The downside if they don’t? Dwell time grows — and with it — exponential damage to revenue, operations, and reputation. Join us as information security and business experts discuss how to define risk tolerance, share anticipatory risk strategies for business, and how CISOs and security leaders can enable them for success in their organizations.

1:00 - 1:46 PM

Learn How CISOs can be Effective Communicators with the Corporate Board

Michael Castro, Risk Executive Advisor & Founder of RiskAware Inc.

Are CISOs failing in their communication to the Board? It’s the CISO’s job to identify the risks that are most likely to impact the business. Join us to hear how keynote speaker, Michael Castro, former CISO, Risk Executive Advisor and Founder of RiskAware Inc, and current member of NACD (National Association of Corporate Directors), is changing mindsets in a rapidly evolving threat landscape and shares his strategies & tips for effective communication with corporate leadership. You’ll also learn how Canadian SMEs or larger organizations should be investing in information security, and what steps should they be taking to bolster their resiliency in relation to the Russia-Ukraine war.

Moderated by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, Foundry (formerly IDG Communications)

1:46 - 2:18 PM

The Shifting Sands of Security: It’s Time to Embrace the Predictive Model to Stay Ahead of Sophisticated Attacks

John McClurg, Senior Vice President & CISO, BlackBerry

Join us for an enlightening conversation with one of America’s most influential security professionals, John McClurg, VP and CISO at BlackBerry, as he explores why it’s crucial to switch from a reactive to predictive approach in security given the proliferation of new attack vectors. Plus he provides advice for Canadian security tech buyers on how to benchmark themselves, use managed security service providers to fill resource gaps, as well as how to get executive buy-in for preventative security investments.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, Foundry (formerly IDG Communications)

Is Your Organization Prepared to Fix Its Reputation?: An Interactive Workshop

Caroline Beckmann, Senior Director, Trident DMG

Breaches and intellectual property theft are becoming more commonplace, and for each incident, an organization experiences not only financial harm, but reputational damage. Join us for this workshop to learn how you can prepare your organization to move quickly when reputational damage strikes.

2:18 - 2:41 PM

Choosing the Right Customer Identity and Access Management (CIAM) that’s Safe, Cost-Effective, and Successful for the Modern Organization

Don Cuthbertson, CTO of Converge Technology Solutions, CEO of Portage CyberTech Inc.

As CIAM has evolved over the last 5 years, choosing the right digital platform is critical to minimizing business risk, blocking cyber threats, and delivering services in a safe and timely manner. Join Portage Cybertech CEO, Don Cuthbertson and Digital ID and Authentication Council of Canada President, Joni Brennan, to learn how to create successful trusted outcomes and minimize risk when developing an effective Customer Identity and Access Management system.

Interviewed by: Joni Brennan, President, Digital ID & Authentication Council of Canada

2:41 - 3:14 PM

Dealing with Disaster: Preparing for Key Threats

Juliette Kayyem,  CNN National Security Analyst & Faculty Director, Homeland Security Project and Security and Global Health Project, Harvard’s Kennedy School of Government

Security is constantly evolving to become more sophisticated, and yet it can’t keep up with the threats from bad actors including nation states. The first step for organizations is realizing that you will be the target of attacks – a reality that some CEOs and boards find hard to accept. With that realization, you can begin to prepare your defense to minimize the consequences. Join us for a conversation about assessing the threat landscape, defining risk appetite and supporting that with appropriate resources, crisis management, how physical and cyber security are once again converging, and the kind of leadership necessary to meet the challenge.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, Foundry (formerly IDG Communications)

3:14 - 3:23 PM

Combating the 21st Century Disaster with Dell’s PowerProtect Cyber Recovery

Jason Proctor, from Dell Technologies’ Global Technology Office presents on how its cyber vault is recognized by many parties such as Sheltered Harbor to ensure a safe copy of recovery during disasters. Dell’s unique engineering adopts a 3 I’s approach to ensuring companies can recover during cyber incidents.

3:25 - 4:02 PM

Putting Cybersecurity on the National Agenda

Matt MacNeil, Director, Standards & Technology, CIO Strategy Council Canada

Kevin Magee, Chief Security Officer, Microsoft Canada

Neil Desai, VP Corporate Affairs, Magnet Forensics

With the rapid advancement of technology and unprecedented adoption of digital initiatives, the security/privacy risks and vulnerabilities faced by all Canadians (individuals and citizens alike) are escalating. These risks are intensifying in light of current geopolitical situations, expanding the vulnerabilities of our cities, municipalities, critical infrastructure units, and SMBs. There is an urgent need to address these risks at the national level and we need to ensure that our governments, public and private institutions create a balanced public policy approach – one that will protect Canadians without inhibiting innovation. Listen as our expert panel discusses the role of public policy in advancing Canada’s Cybersecurity mandate.

Moderated by: Sumit Bhatia, Director of Innovation and Policy, Rogers Cybersecure Catalyst, Toronto Metropolitan University

4:02 - 4:12 PM

Break Time

4:12 - 4:35 PM

Design and Deploy Zero Trust Enterprise

Garry Coldwells, Solutions Architect, Palo Alto Networks

Cyberthreats are disrupting our lives now more than ever, and organizations are turning to Zero Trust for complete network security. But how do you make Zero Trust actionable for your organization? Digital transformation is accelerating, with key shifts such as the expanding hybrid workforce and continued migration of applications and data to the cloud. As we make this transformation, information security teams have the opportunity to adopt a modern Zero Trust approach that fits these significant shifts. This means taking Zero Trust principles and making them actionable across users, applications and infrastructure, effectively rebuilding security to keep pace with these tectonic shifts. Join us as we explore how Palo Alto Networks can help you navigate this journey through our unique blend of the highest level of capabilities, an integrated platform and extensive in-house expertise around Zero Trust.

4:35 - 5:01 PM

Anticipating Rising Threats

Deneen DeFiore, Vice President & CISO, United Airlines

As one of the largest airlines in the world, United Airlines faces — and manages — rising threats every day. Join us to learn how they mitigate risks in an environment of unknown and rising threats.

Interviewed by: Derek Hulitzky, Former VP Content Development & Strategy, Foundry (formerly IDG Communications)

5:01 - 5:07 PM

Self-Learning AI Defends Attacks Faster Than Your Team, Presented by Darktrace

Jake Dorio, Cybersecurity Account Executive & Team Lead, Darktrace

5:07 - 5:35 PM

IDC’s Future of Trust 2022 Predictions for Canada

Yogesh Shivhare, Research Mgr., Security & Infrastructure, IDC Canada

Trusted ecosystems in Canada are under attack as cyber threats continue to rise. IDC predicts by 2025, 30% of Canadian IT buyers will adopt network security as a service to ensure consistent protection. Join us as IDC reveals why this, and other predictions, are important for Canadian business and IT leaders in 2022.

IDC’s Global Predictions for the Future of Trust

Amita Potnis, Former Research Director, Future of Trust, IDC

To align traditional security and risk solutions with customer success, brand, and reputation, IDC predicts that by 2025, 35 percent of organizations will replace net promoter score-like metrics with trust indices in RFPs. Join us as IDC reveals why this, and other predictions, are important for CISOs in 2022.

5:35 - 6:06 PM

Strategies for Finding, Growing and Retaining Security Talent

Tim Byrd, CISO, TIAA
Khalilah Scott, Founder, TechSecChix
Jeff Weber, Executive Director, Robert Half

There are millions of unfilled cybersecurity jobs, according to some estimates, increasing demand to unprecedented levels. At the same time, the frequency and severity of cyberattacks are also increasing, forcing organizations to stretch their security talent. Join us as our panel of experts explore short- and long-term solutions for recruiting and retaining security talent, while adding diversity to their teams.

Interviewed by: Beth Kormanik, Manager, Content Development, Foundry (formerly IDG Communications)

Today’s Theme: Defensive Strategies

Curating the InfoSec Toolbox, and How to Master It: Choosing Wisely in the Always-Changing Security Superstore

Developing a strategy for cybersecurity can seem daunting in a constantly changing technology environment. Whether best-of-breed, or platform-based, many of today’s organizations use just a fraction of the security capabilities from the tools and services available to them, thereby diluting the value of their investment. At the same time, new tools, services, and capabilities continue to emerge that lower the value of existing investments — or render them obsolete. Smart organizations use strategies to maximize security investments, including rationalization, utilization, optimization, and savvy analysis. Join us as information security experts share proven strategies you need to consider when creating your cybersecurity masterplan.

1:00 - 1:34 PM

CISO Leadership Perspectives on Cybersecurity Threats: How to Take Control of Your Organization’s Security Destiny

Vaughn Hazen, Assistant Vice-President & CISO, CN

Join us to hear how Vaughn Hazen, CISO for CN, Canada’s largest railway and North American transportation and logistics leader, deals with constant security threats. You’ll learn how to become a more resilient security leader in an evolving regulatory landscape and after the fallout from the pandemic on cybersecurity. Canadian SMEs will also learn how to optimize investments in Information Security and the best ways to mitigate risk, as well as subtle differences in how US companies address risk vs. Canadian ones.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, Foundry (formerly IDG Communications)

1:34 - 2:05 PM

Countering Crises: Planning for Cyber Attacks with Tabletop Exercises

Randy Purse, Senior Cybersecurity Advisor, Rogers Cybersecure Catalyst, Toronto Metropolitan University

With costly cyber incidents increasing in occurrence, every organization should have an incident response plan. From SMEs to large corporations, no organization is immune. Your ability to respond effectively will have a major impact on your organization’s bottom-line, data, reputation and relationships. Start preparing your response– this condensed interactive session will guide you through key decision points in the incident response process, posing the big questions organizations must consider to be ready and resilient.

2:05 - 2:35 PM

Getting the Business to Define Risk Tolerance

Renee Guttmann, VC Advisor, Advisory Board Member and former CISO

Security organizations are getting better at managing risk tolerance, but often the difficult part is trying to get the business to define what their risk tolerance is. For the CISO, it’s key to work with business leadership to reach a common understanding of the organization’s risk tolerance. Join us as we discuss approaches to tackle this critical objective.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, Foundry (formerly IDG Communications)

2:35 - 3:06 PM

Overcoming the Challenges of Digital Identity in a Privacy-Focused Era

Hassan Khan, Co-Founder & CEO, TODAQ

As Canadian organizations and consumers embrace digital delivery of key services and commerce, it is a growing concern for businesses to balance customer experience and combat identity fraud and cyberthreats. Join us for the fireside chat with Hassan Khan, Co-Founder & CEO of TODAQ, to hear about the trends and challenges that organizations need to navigate to strike this balance.

Interviewed by: Yogesh Shivhare, Research Mgr., Security & Infrastructure, IDC Canada

3:06 - 3:40 PM

Making Sense of the Security Vendor Landscape

Jay Leek, Managing Partner & Co-Founder, SYN Ventures

As security solutions evolve, emerge, and disrupt incumbent players, buying organizations face challenges in vetting what’s right for their business. Join us for guidance from one of the industry’s leading watchers of enterprise security tech.

Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, Foundry (formerly IDG Communications)

3:40 - 3:50 PM

Break Time

3:50 - 4:26 PM

Privacy and the Transforming Digital Workforce

Lynn Haaland, Chief Compliance, Ethics & Privacy Officer, Zoom

Zoom’s compliance department ballooned from just one employee in January 2020 to a team of 75 professionals in less than two years. It’s a reflection of the company’s growth as well as the complex issues organizations today have to address. Join us to explore issues such as how a company’s culture and values should influence its privacy approach; practical tips for how security and privacy teams can work together; adopting a mindset of “getting to yes” where product innovation meets compliance; and the looming conflict between the globalization and sovereignty of security.

Interviewed by: Beth Kormanik, Manager, Content Development, Foundry (formerly IDG Communications)

4:26 - 4:59 PM

Venture Capital and Security: An Insider’s View

Rick Grinnell, Founder and Managing Partner, Glasswing Ventures
Renee Guttmann, VC Advisor, Advisory Board Member and former CISO

It’s been a big year for venture capital in the security space. Join us as our panel of experts discusses the VC activity they’re seeing, and trends that could impact buyers of security technologies.

Interviewed by: Maryfran Johnson, CEO, Maryfran Johnson Media

4:59 - 5:18 PM

Building a Technology Rationalization Program

DJ Goldsworthy, VP & Global Practice Lead, Aflac

Whether best-of-breed, or platform-based, many organizations use just a fraction of the security capabilities in the tools and services available to them, thereby diluting the value of their investment. At the same time, new tools, services and capabilities continue to emerge that lower the value of existing investments — or render them obsolete. Smart organizations use strategies to maximize security investments, including rationalization, utilization, optimization, and savvy analysis. Join us to learn how a security rationalization program works.

Interviewed by: Derek Hulitzky, Former VP, Content Development and Strategy, Foundry (formerly IDG Communications)

Agenda subject to change.